IB/ucma: Fix theoretical user triggered use-after-free
authorJason Gunthorpe <jgunthorpe@obsidianresearch.com>
Tue, 4 Aug 2015 23:13:32 +0000 (17:13 -0600)
committerDoug Ledford <dledford@redhat.com>
Sat, 29 Aug 2015 02:54:48 +0000 (22:54 -0400)
commit7e967fd0b84a843b2475acc67a5a8df138c5f5c0
tree3b3fce60c75058d1d5ce891b6c1dc7efca549d6f
parentb8ac3112462900a55a45df8e6098c67a139d8c2d
IB/ucma: Fix theoretical user triggered use-after-free

Something like this:

CPU A                         CPU B
Acked-by: Sean Hefty <sean.hefty@intel.com>
========================      ================================
ucma_destroy_id()
 wait_for_completion()
                              .. anything
                                ucma_put_ctx()
                                  complete()
 .. continues ...
                              ucma_leave_multicast()
                               mutex_lock(mut)
                                 atomic_inc(ctx->ref)
                               mutex_unlock(mut)
 ucma_free_ctx()
  ucma_cleanup_multicast()
   mutex_lock(mut)
     kfree(mc)
                               rdma_leave_multicast(mc->ctx->cm_id,..

Fix it by latching the ref at 0. Once it goes to 0 mc and ctx cannot
leave the mutex(mut) protection.

The other atomic_inc in ucma_get_ctx is OK because mutex(mut) protects
it from racing with ucma_destroy_id.

Signed-off-by: Jason Gunthorpe <jgunthorpe@obsidianresearch.com>
Acked-by: Sean Hefty <sean.hefty@intel.com>
Signed-off-by: Doug Ledford <dledford@redhat.com>
drivers/infiniband/core/ucma.c